coffeegist / cat-sitesView external linksLinks
Library of sites for categorization
☆28Feb 12, 2019Updated 7 years ago
Alternatives and similar repositories for cat-sites
Users that are interested in cat-sites are comparing it to the libraries listed below
Sorting:
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- Auto-generate an HTaccess for payload delivery -- automatically pulls ips/nets/etc from known sandbox companies/sources that have been se…☆170Aug 10, 2020Updated 5 years ago
- Ansible role that Installs Mythic☆19Jun 24, 2024Updated last year
- Domain fronting using Google app engine☆53Feb 19, 2018Updated 7 years ago
- Modular Enumeration and Password Spraying Framework☆129Apr 10, 2024Updated last year
- The Discretionary ACL Modification Project: Persistence Through Host-based Security Descriptor Modification☆381Jul 25, 2019Updated 6 years ago
- Copy cat model for Proofpoint☆91Apr 30, 2020Updated 5 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 3 years ago
- A library of pretexts to use on offensive phishing engagements.☆383Aug 9, 2019Updated 6 years ago
- A slick, modern, privacy-focused web interface for viewing and analyzing Nuclei scan results. Built for pentesters & bug hunters who want…☆26Mar 31, 2025Updated 10 months ago
- Quickly Implement Mod-Rewrite in your infastructure☆86Apr 21, 2017Updated 8 years ago
- Scripts and results for finding domain frontable CloudFront domains☆54Feb 23, 2018Updated 7 years ago
- Chameleon: A tool for evading Proxy categorisation☆515Nov 28, 2024Updated last year
- Determine if the WebClient Service (WebDAV) is running on a remote system☆142Mar 9, 2024Updated last year
- ☆37Jan 7, 2025Updated last year
- Basic network port scanner created in C#☆19Aug 1, 2019Updated 6 years ago
- Precompiled binaries for various projects☆12Nov 6, 2020Updated 5 years ago
- CSHARP DCOM Fun☆138Sep 16, 2019Updated 6 years ago
- User enumeration with Microsoft Teams API☆175Jul 9, 2021Updated 4 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Jun 4, 2020Updated 5 years ago
- CherryTree OSCP methodology template☆15Dec 10, 2018Updated 7 years ago
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆16Apr 30, 2021Updated 4 years ago
- An Ubuntu 18.04 box for Mythic C2 framework development☆17Jun 17, 2022Updated 3 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 10 months ago
- Check the Domain for Local Admin Access☆20Feb 20, 2025Updated 11 months ago
- ☆17Apr 5, 2021Updated 4 years ago
- C# application that allows you to quick run SSH commands against a host or list of hosts☆42Sep 21, 2020Updated 5 years ago
- Flexible C# shellcode runner☆39Jan 18, 2022Updated 4 years ago
- Simple .NET assembly to interact with services.☆43Sep 27, 2019Updated 6 years ago
- Collection of Azure Tools to Pull down for Attacking an Environment + quick tips and other useful information☆77Dec 7, 2025Updated 2 months ago
- ☆26Feb 11, 2025Updated last year
- Samba, NFS shares spider and grepper☆71Jul 11, 2018Updated 7 years ago
- Azure AD RedTeam Full Enumeration Script used to query all aspects of your target Azure tenant.☆69Jul 10, 2024Updated last year
- Ansible playbook to deploy a phishing engagement in the cloud.☆223May 19, 2022Updated 3 years ago
- Federated Office365 user enumeration based on correlated response trend analysis☆50May 3, 2022Updated 3 years ago
- RACE is a PowerShell module for executing ACL attacks against Windows targets.☆243May 5, 2023Updated 2 years ago